Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Request: blocked hostname

    Scheduled Pinned Locked Moved Captive Portal
    14 Posts 3 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GertjanG
      Gertjan
      last edited by

      Hi,

      The captive portal instance should run on it's own reserved interface.
      One of the advantages is then : add your host names to aliases, and make nice rules with them on the interface's Firewall tab.

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      1 Reply Last reply Reply Quote 0
      • Mr_JinXM
        Mr_JinX
        last edited by

        Hi,

        I'm not sure you understand or i have explained it well enough.

        In addition to the "Allowed Hostnames" can we have a "blocked Hostnames"

        0_1535103742812_captive.PNG

        GertjanG 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          Why would you need that? If they are not "allowed" then they blocked - how the captive portal works.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan @Mr_JinX
            last edited by Gertjan

            @jinksy said in Request: blocked hostname:

            Hi,
            I'm not sure you understand or i have explained it well enough.

            You nailed it !!

            The "Allowed Hostnames" tab contains a list with host names that are accessible to the Captive portal visitor even before he authenticates - for example, while visiting the login page.
            This is useful so pages could be included into the login-page with usage rules, images hosted remotely, and stuff like that.
            Nothing to do with limiting or allowing access to hosts after being authenticated. For this, you have your firewall rules on the Firewall => Interface tab.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            Mr_JinXM 1 Reply Last reply Reply Quote 0
            • Mr_JinXM
              Mr_JinX @Gertjan
              last edited by Mr_JinX

              @gertjan

              Oh i see, I thought it was for allowing access or to bypass the captive portal, similar to what you can do with MAC addresses.

              Do you know of any way you can block certain hostnames possibly using regex?

              In short i want to block certain hostnames from being able to access or use the network based on hostname, aprox 3000 potential devices, and i dont want to assign each MAC a static IP to block it on the firewall access list.

              PS thank you for the clarification,

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                So your saying these devices would be able to auth, ie some user using them with ability to auth to the captive portal. And you don't want them to be able to?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                Mr_JinXM 1 Reply Last reply Reply Quote 0
                • Mr_JinXM
                  Mr_JinX @johnpoz
                  last edited by

                  @johnpoz

                  Yes, its a "public" network and i dont want corporate devices using it,

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    Now I get yah... what are these devices - laptops/PCs? Windows for example can be prevented from connecting to specific wifi networks..

                    That is the rub when running a corp network where you try and filter, but then have a guest network for "guest" to use that you don't filter - your users just can jump on this guest network and circumvent your filters.

                    What stops them from just connecting to their phones hotspot and circumventing?

                    This is better controlled on the device by limiting what wifi they can actually connect to, etc. Windows allows for filters, you can do a denyall other than your allowed, etc.

                    If these are specific types of devices you could deny them from getting an IP from your dhcp server with use of partial mac address..

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    Mr_JinXM 1 Reply Last reply Reply Quote 1
                    • Mr_JinXM
                      Mr_JinX @johnpoz
                      last edited by

                      @johnpoz

                      You have hit the nail on the head, and thats what i've requested to be implemented, wireless filters, which works really well.

                      It's mainly a security concern that a corporate Windows laptop can connect to the same network as 400 other users, not everyone has the best intention... hell if i wasnt were i was doing what i do i would have poked a little myself

                      Thank you

                      Chris

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        Normally you run guest network in isolation mode.. I have never seen an AP even the cheapest of the cheapest wifi routers normally support isolation mode for an SSID, they sometimes call it something different.

                        But wifi device A on ssid XYZ can not talk to device B.. This should help with security concerns of corp devices on same network as guest devices.

                        Normally anyone that runs a hotspot should be in this sort of setup - say your starbucks and the like.. Hotels for example normally like this.. But then you normally always force vpn connections on laptops as well so that even if they connect to a wifi network that is open, all their traffic goes through a vpn, and firewall on the device would prevent access to laptop itself..

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        Mr_JinXM 1 Reply Last reply Reply Quote 0
                        • Mr_JinXM
                          Mr_JinX @johnpoz
                          last edited by

                          @johnpoz

                          Your right again... Cisco just name it "Public Secure Packet Forwarding" , which we have implemted,

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by johnpoz

                            Unifi calls its Guest Policy and Access Control - you can run this without a captive port or with, etc. And prevent clients from talking to each other..

                            Like I said have never seen an AP that doesn't have some way of isolation of clients.. BTW your mac control on your captive portal running on pfsense would not stop client A from talking B.. Those controls would only work for devices talking to pfsense or beyond.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • GertjanG
                              Gertjan
                              last edited by

                              When using multiple AP's, all hooked up to a 'dumb' switch, and this switch hooked up to an OPTx interface on pfSense, each AP should be enforced to allow communication to OPTx - and no body (any other device on the switch) else.
                              Client Isolation, or what ever the name is, on each AP isn't enough.

                              Consider "AP1" and 2 clients connected to it. Client Isolation on this AP handles the job. But a third client, connected to AP2 would be able to "see" client 1 and 2 on AP1.

                              On a low-budget Cisco/Linksys - typically an E1200 - using the DD-WRT OS, this can be handled with :

                              #!/bin/ash
                              insmod ebtables
                              insmod ebtable_filter
                              ebtables -t filter -A FORWARD -s 0:0:0:0:0:0/0:0:0:0:0:0 -d Broadcast -j ACCEPT
                              ebtables -t filter -A FORWARD -s 0:0:0:0:0:0/0:0:0:0:0:0 -d 00:0f:b5:fe:4e:e7 -j ACCEPT
                              ebtables -t filter -A FORWARD -s 00:0f:b5:fe:4e:e7 -d 0:0:0:0:0:0/0:0:0:0:0:0 -j ACCEPT
                              

                              "00:0f:b5:fe:4e:e7" is the MAC of my OPTx (pfSense - Captive portal) interface.
                              It states :
                              Allow all broadcasts.
                              Allow all traffic coming to interface OPTx
                              Allow all traffic coming from OPtx
                              (drop the rest)

                              With these ebtables rules on each AP, inter AP communication is prohibited.

                              I guess the same result can be obtained with a "smart switch".

                              No "help me" PM's please. Use the forum, the community will thank you.
                              Edit : and where are the logs ??

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.